Freebsd

Freebsd

515 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.08%
  • Veröffentlicht 12.11.2024 15:15:11
  • Zuletzt bearbeitet 03.11.2025 21:17:20

The hda driver is vulnerable to a buffer over-read from a guest-controlled value.

  • EPSS 0.08%
  • Veröffentlicht 12.11.2024 15:15:11
  • Zuletzt bearbeitet 03.11.2025 21:17:20

The NVMe driver queue processing is vulernable to guest-induced infinite loops.

  • EPSS 0.08%
  • Veröffentlicht 12.11.2024 15:15:10
  • Zuletzt bearbeitet 03.11.2025 21:17:20

The NVMe driver function nvme_opc_get_log_page is vulnerable to a buffer over-read from a guest-controlled value.

  • EPSS 0.06%
  • Veröffentlicht 12.11.2024 15:15:10
  • Zuletzt bearbeitet 03.11.2025 21:17:20

The virtio_vq_recordon function is subject to a time-of-check to time-of-use (TOCTOU) race condition.

  • EPSS 0.13%
  • Veröffentlicht 12.11.2024 15:15:10
  • Zuletzt bearbeitet 03.11.2025 21:17:20

A guest can trigger an infinite loop in the hda audio driver.

  • EPSS 0.11%
  • Veröffentlicht 05.09.2024 05:15:13
  • Zuletzt bearbeitet 21.11.2024 09:15:25

An insufficient boundary validation in the USB code could lead to an out-of-bounds write on the heap, with data controlled by the caller. A malicious, privileged software running in a guest VM can exploit the vulnerability to achieve code execution ...

  • EPSS 1%
  • Veröffentlicht 05.09.2024 05:15:13
  • Zuletzt bearbeitet 04.11.2025 17:16:04

The ctl_report_supported_opcodes function did not sufficiently validate a field provided by userspace, allowing an arbitrary write to a limited amount of kernel help memory. Malicious software running in a guest VM that exposes virtio_scsi can explo...

  • EPSS 1.14%
  • Veröffentlicht 05.09.2024 05:15:13
  • Zuletzt bearbeitet 21.11.2024 09:35:00

Concurrent removals of certain anonymous shared memory mappings by using the UMTX_SHM_DESTROY sub-request of UMTX_OP_SHM can lead to decreasing the reference count of the object representing the mapping too many times, causing it to be freed too earl...

  • EPSS 2.67%
  • Veröffentlicht 05.09.2024 05:15:13
  • Zuletzt bearbeitet 04.11.2025 17:16:05

The ctl_request_sense function could expose up to three bytes of the kernel heap to userspace. Malicious software running in a guest VM that exposes virtio_scsi can exploit the vulnerabilities to achieve code execution on the host in the bhyve users...

  • EPSS 6.89%
  • Veröffentlicht 05.09.2024 05:15:13
  • Zuletzt bearbeitet 04.11.2025 17:16:14

The function ctl_write_buffer incorrectly set a flag which resulted in a kernel Use-After-Free when a command finished processing. Malicious software running in a guest VM that exposes virtio_scsi can exploit the vulnerabilities to achieve code exec...